Conduct advanced search queries across dozens of resources simultaneously
Access content believed to be private on Facebook
Locate a target’s long forgotten Facebook activity
Access restricted information through cached results
Conduct thorough searches on all social networks
Monitor live content and communication on social networks
Recover Twitter posts from deleted and manipulated accounts
Identify users of private cellular telephone numbers from social networks
Retrieve subscriber information from any landline or cellular telephone number
Reverse-search photographs and videos for additional copies and details
Search historical deleted versions of websites
View multiple historic satellite images and street views of any location
Identify all social networks in use by target username
Use Android Emulators to exploit content only available in apps
Create custom operating systems to always have a clean investigation environment

1. Drona – an attack VM that has most of the required tools and features for IoT security analysis.
2. ExplIoT – Open Source IoT exploitation framework created by us specifically for IoT penetration testing.
3. DIVA–IoT – a vulnerable IoT sensor made in-house for hands-on exercises.
4. Practical IoT Hacking Lab Manual – with detailed and step by step information on each lab.

Examples of where RF is used in ICS and IIoT
Overview of the RF Pentesting methodology

Capturing RF Signals

Hardware used for different RF protocols
SDR vs rfcat
Comparison of different SDR hardware
Finding the right frequencies
Using the right antenna
Hands-on RF spectrum analysis
Hands-on RF signal capture

Hands-on malware dissection
How to create a safe malware analysis environment
How to quickly extract network and host-based indicators
How to perform dynamic analysis using system monitoring utilities to capture the file system, registry, and network activity generated by malware
How to debug malware and modify control flow and logic of software
To analyze assembly code after a crash course in the Intel x86 assembly language
Windows internals and APIs
How to use key analysis tools like IDA Pro and OllyDbg
What to look for when analyzing a piece of malware
The art of malware analysis – not just running tools

28.Practical Vulnerability Discovery with Fuzzing *

Protocol and specification analysis
Mutational and grammar-based input generation
Target monitoring using custom developed test harnesses
Best practices in analyzing software exceptions
Tips and guidance in how to discover 0-day vulnerabilities

Reflective code injection – code injection that never touches disk
Building reflective injection code and investigating how it works
Lab: Building and deploying reflective injection code
Detecting reflective injection code and investigating attacks that use it
Lab: Detecting and investigating reflective injection attacks
Process hollowing – what is it, why does it exist, and how can we use it
Lab: Building and deploying process hollowing code injection tools
Detecting process hollowing code and investigating attacks that use it
Lab: Detecting and investigating process hollowing code injection attacks

Day 3: Bam – Crank it up another notch!

Hollowing processes that are already running to bypass AV
Lab: Building and deploying running process hollowing tools
Putting it together like a nation state – chaining code injection techniques like Stuxnet
Lab: Build your own Stuxnet
Detecting and investigating chained code injection techniques
Lab: Investigate your own Stuxnet
Hooking to inject code
Lab: Building and detecting code injection using hooking

Introductions
What is the demand for security automation?
Other Industries’ Automation Achievements
Security Automation and Orchestration Introduction
Difference between Automation and Orchestration
Business Benefits from Security Automation
Automation in Different Organizations
Automatable Security Operations Areas